


default search action
Alessandro Armando
Person information
- affiliation: University of Genoa, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j47]Enrico Russo
, Gabriele Costa
, Giacomo Longo, Alessandro Armando, Alessio Merlo
:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. IEEE Trans. Dependable Secur. Comput. 20(6): 4899-4912 (2023) - [j46]Giacomo Longo
, Enrico Russo
, Alessandro Armando, Alessio Merlo
:
Attacking (and Defending) the Maritime Radar System. IEEE Trans. Inf. Forensics Secur. 18: 3575-3589 (2023) - [c99]Enrico Russo, Marina Ribaudo, Alessandro Orlich, Giacomo Longo
, Alessandro Armando:
Cyber Range and Cyber Defense Exercises: Gamification Meets University Students. Gamify@SIGSOFT FSE 2023: 29-37 - [c98]Giacomo Longo
, Alessio Merlo, Alessandro Armando, Enrico Russo:
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems. LCN 2023: 1-6 - 2022
- [j45]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 61-80 (2022) - [c97]Marco Raimondi, Giacomo Longo
, Alessio Merlo, Alessandro Armando, Enrico Russo:
Training the Maritime Security Operations Centre Teams. CSR 2022: 388-393 - [i9]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework. CoRR abs/2202.06954 (2022) - [i8]Giacomo Longo
, Enrico Russo, Alessandro Armando, Alessio Merlo:
Attacking (and defending) the Maritime Radar System. CoRR abs/2207.05623 (2022) - 2021
- [j44]Enrico Russo, Luca Verderame, Alessandro Armando, Alessio Merlo:
DIOXIN: runtime security policy enforcement of fog applications. Int. J. Grid Util. Comput. 12(2): 126-138 (2021) - [j43]Luca Demetrio
, Battista Biggio
, Giovanni Lagorio, Fabio Roli
, Alessandro Armando:
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware. IEEE Trans. Inf. Forensics Secur. 16: 3469-3478 (2021) - [j42]Luca Demetrio
, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli
:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. ACM Trans. Priv. Secur. 24(4): 27:1-27:31 (2021) - [c96]Giovanni Lagorio, Marina Ribaudo, Alessandro Armando:
Capture the Flag competitions for Higher Education. ITASEC 2021: 447-460 - [e8]Alessandro Armando, Michele Colajanni:
Proceedings of the Italian Conference on Cybersecurity, ITASEC 2021, All Digital Event, April 7-9, 2021. CEUR Workshop Proceedings 2940, CEUR-WS.org 2021 [contents] - 2020
- [j41]Enrico Russo
, Gabriele Costa
, Alessandro Armando
:
Building next generation Cyber Ranges with CRACK. Comput. Secur. 95: 101837 (2020) - [c95]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. RAID 2020: 17-29 - [c94]Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen
:
Benchmarking UAQ Solvers. SACMAT 2020: 145-152 - [c93]Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen
:
AQUA: An Efficient Solver for the User Authorization Query Problem. SACMAT 2020: 153-154 - [i7]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. CoRR abs/2001.06681 (2020) - [i6]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations. CoRR abs/2003.13526 (2020) - [i5]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. CoRR abs/2006.09769 (2020) - [i4]Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. CoRR abs/2008.07125 (2020)
2010 – 2019
- 2019
- [c92]Giuseppina Murino, Alessandro Armando
, Armando Tacchella
:
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures. CyCon 2019: 1-19 - [c91]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries. ITASEC 2019 - [c90]Nicolas Dejon
, Davide Caputo
, Luca Verderame
, Alessandro Armando
, Alessio Merlo
:
Automated Security Analysis of IoT Software Updates. WISTP 2019: 223-239 - [i3]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries. CoRR abs/1901.03583 (2019) - 2018
- [j40]Gabriele Costa
, Alessio Merlo
, Luca Verderame
, Alessandro Armando
:
Automatic security verification of mobile app configurations. Future Gener. Comput. Syst. 80: 519-536 (2018) - [c89]Enrico Russo
, Gabriele Costa, Alessandro Armando
:
Scenario Design and Validation for Next Generation Cyber Ranges. NCA 2018: 1-4 - 2017
- [j39]Giada Sciarretta
, Roberto Carbone
, Silvio Ranise
, Alessandro Armando
:
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements. Comput. Secur. 71: 71-86 (2017) - [j38]Nadia Metoui
, Michele Bezzi, Alessandro Armando
:
Risk-Based Privacy-Aware Access Control for Threat Detection Systems. Trans. Large Scale Data Knowl. Centered Syst. 36: 1-30 (2017) - [c88]Avinash Sudhodanan, Roberto Carbone
, Luca Compagna, Nicolas Dolgin, Alessandro Armando
, Umberto Morelli
:
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. EuroS&P 2017: 350-365 - [e7]Alessandro Armando, Roberto Baldoni, Riccardo Focardi:
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017. CEUR Workshop Proceedings 1816, CEUR-WS.org 2017 [contents] - 2016
- [j37]Alessio Merlo
, Gabriele Costa
, Luca Verderame
, Alessandro Armando
:
Android vs. SEAndroid: An empirical assessment. Pervasive Mob. Comput. 30: 113-131 (2016) - [j36]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs. Int. J. Softw. Tools Technol. Transf. 18(2): 187-204 (2016) - [c87]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies. ABAC@CODASPY 2016: 35-46 - [c86]Nadia Metoui
, Michele Bezzi, Alessandro Armando
:
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems. FDSE 2016: 285-304 - [c85]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
, Konrad S. Wrona
:
Developing a NATO BYOD security policy. ICMCIS 2016: 1-6 - [c84]Konrad S. Wrona
, Sander Oudkerk, Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Lisa Ferrari, Richard McEvoy:
Assisted content-based labelling and classification of documents. ICMCIS 2016: 1-7 - [c83]Avinash Sudhodanan, Alessandro Armando, Roberto Carbone, Luca Compagna:
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications. NDSS 2016 - [c82]Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise:
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. SECRYPT 2016: 147-158 - 2015
- [j35]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
:
Formal modeling and automatic enforcement of Bring Your Own Device policies. Int. J. Inf. Sec. 14(2): 123-140 (2015) - [j34]Alessandro Armando, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Based Privacy-Aware Information Disclosure. Int. J. Secur. Softw. Eng. 6(2): 70-89 (2015) - [c81]Alessandro Armando
, Gianluca Bocci, Gabriele Costa
, Rocco Mammoliti, Alessio Merlo, Silvio Ranise
, Riccardo Traverso, Andrea Valenza
:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. MIST@CCS 2015: 41-49 - [c80]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
Compiling NATO authorization policies for enforcement in the cloud and SDNs. CNS 2015: 741-742 - [c79]Alessandro Armando
, Roberto Carbone
, Gabriele Costa
, Alessio Merlo:
Android Permissions Unleashed. CSF 2015: 320-333 - [c78]Alessio Coletta
, Alessandro Armando
:
Security Monitoring for Industrial Control Systems. CyberICS/WOS-CPS@ESORICS 2015: 48-62 - [c77]Alessandro Armando
, Alessio Merlo, Luca Verderame
:
Trusted host-based card emulation. HPCS 2015: 221-228 - [c76]Alessandro Armando
, Michele Bezzi, Francesco Di Cerbo, Nadia Metoui
:
Balancing Trust and Risk in Access Control. OTM Conferences 2015: 660-676 - [c75]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies. SACMAT 2015: 151-155 - [c74]Alessandro Armando
, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa
, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform. TACAS 2015: 225-230 - 2014
- [j33]Alessandro Armando
, Massimo Benerecetti
, Jacopo Mantovani:
Counterexample-guided abstraction refinement for linear programs with arrays. Autom. Softw. Eng. 21(2): 225-285 (2014) - [j32]Alessandro Armando
, Serena Elisa Ponta:
Model checking authorization requirements in business processes. Comput. Secur. 40: 1-22 (2014) - [j31]Alessandro Armando
, Gabriele Costa
, Luca Verderame
, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. Computer 47(6): 48-56 (2014) - [j30]Alessandro Armando
, Alessio Merlo, Luca Verderame
:
Security considerations related to the use of mobile devices in the operation of critical infrastructures. Int. J. Crit. Infrastructure Prot. 7(4): 247-256 (2014) - [j29]Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
Mobile App Security Analysis with the MAVeriC Static Analysis Module. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 103-119 (2014) - [c73]Alessandro Armando
, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Aware Information Disclosure. DPM/SETOP/QASA 2014: 266-276 - [c72]Alessandro Armando
, Roberto Carbone
, Eyasu Getahun Chekole
, Silvio Ranise
:
Attribute based access control for APIs in spring security. SACMAT 2014: 85-88 - [c71]Silvio Ranise
, Anh Tuan Truong, Alessandro Armando
:
Scalable and precise automated analysis of administrative temporal role-based access control. SACMAT 2014: 103-114 - [c70]Alessandro Armando
, Roberto Carbone
, Eyasu Getahun Chekole
, Claudio Petrazzuolo, Andrea Ranalli, Silvio Ranise
:
Selective Release of Smart Metering Data in Multi-domain Smart Grids. SmartGridSec 2014: 48-62 - [c69]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
SATMC: A SAT-Based Model Checker for Security-Critical Systems. TACAS 2014: 31-45 - [c68]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
:
Enabling BYOD through secure meta-market. WISEC 2014: 219-230 - 2013
- [j28]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino
, Alessandro Sorniotti:
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Comput. Secur. 33: 41-58 (2013) - [j27]Alessandro Armando
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Breaking and fixing the Android Launching Flow. Comput. Secur. 39: 104-115 (2013) - [c67]Alessandro Armando, Enrico Giunchiglia, Marco Maratea, Serena Elisa Ponta:
Modeling and Reasoning about Business Processes under Authorization Constraints: A Planning-Based Approach. ICAPS 2013 - [c66]Alessandro Armando
, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. FPS 2013: 227-244 - [c65]Alessandro Armando
, Aniello Castiglione
, Gabriele Costa
, Ugo Fiore
, Alessio Merlo, Luca Verderame
, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. ICT-EurAsia 2013: 469-478 - [c64]Alessandro Armando
, Roberto Carbone
, Luca Zanetti:
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. NSS 2013: 728-734 - [c63]Alessandro Armando
, Gabriele Costa
, Alessio Merlo:
Bring your own device, securely. SAC 2013: 1852-1858 - [c62]Alessandro Armando
, Matteo Grasso, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Content-based information protection and release in NATO operations. SACMAT 2013: 261-264 - [c61]Alessandro Armando, Alessio Merlo, Luca Verderame:
An Empirical Evaluation of the Android Security Framework. SEC 2013: 176-189 - 2012
- [j26]Alessandro Armando
, Gavin Lowe:
Preface. J. Comput. Secur. 20(1): 1 (2012) - [j25]Alessandro Armando
, Silvio Ranise
:
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving. J. Comput. Secur. 20(4): 309-352 (2012) - [j24]Alessandro Armando
, Enrico Giunchiglia
, Marco Maratea, Serena Elisa Ponta:
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints. J. Comput. Syst. Sci. 78(1): 119-141 (2012) - [j23]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. J. Internet Serv. Inf. Secur. 2(3/4): 3-17 (2012) - [c60]Alessandro Armando, Silvio Ranise, Fatih Turkmen
, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. CODASPY 2012: 241-248 - [c59]Alessandro Armando
, Silvio Ranise
:
Automated and Efficient Analysis of Role-Based Access Control with Attributes. DBSec 2012: 25-40 - [c58]Silvio Ranise
, Alessandro Armando
:
On the Automated Analysis of Safety in Usage Control: A New Decidability Result. NSS 2012: 15-28 - [c57]Alessandro Armando
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). SEC 2012: 13-24 - [c56]Alessandro Armando
, Roberto Carbone
, Alessio Merlo:
Formal Analysis of a Privacy-Preserving Billing Protocol. SmartGridSec 2012: 108-119 - [c55]Silvio Ranise
, Anh Tuan Truong, Alessandro Armando
:
Boosting Model Checking to Analyse Large ARBAC Policies. STM 2012: 273-288 - [c54]Alessandro Armando
, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone
, Yannick Chevalier
, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea
, Sebastian Mödersheim
, David von Oheimb, Giancarlo Pellegrino
, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti
, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [c53]Alessandro Armando
, Giancarlo Pellegrino
, Roberto Carbone
, Alessio Merlo, Davide Balzarotti:
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap. TAP@TOOLS 2012: 3-18 - [c52]Alessandro Armando
, Gabriele Costa
, Alessio Merlo:
Formal Modeling and Reasoning about the Android Security Framework. TGC 2012: 64-81 - [i2]Alessandro Armando, Alessio Merlo, Luca Verderame:
Security Issues in the Android Cross-Layer Architecture. CoRR abs/1209.0687 (2012) - 2011
- [c51]Francesco Alberti, Alessandro Armando
, Silvio Ranise
:
ASASP: Automated Symbolic Analysis of Security Policies. CADE 2011: 26-33 - [c50]Francesco Alberti, Alessandro Armando
, Silvio Ranise
:
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies. AsiaCCS 2011: 165-175 - [c49]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino
, Alessandro Sorniotti:
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? SEC 2011: 68-79 - [c48]Alessandro Armando
, Roberto Carbone
, Silvio Ranise
:
Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach. ICSC 2011: 356-363 - [c47]Alessandro Armando
, Silvio Ranise
:
Automated Analysis of Infinite State Workflows with Access Control Policies. STM 2011: 157-174 - [e6]Alessandro Armando
, Gavin Lowe:
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6186, Springer 2011, ISBN 978-3-642-16073-8 [contents] - 2010
- [j22]Alessandro Armando
, Peter Baumgartner, Gilles Dowek
:
Preface. J. Autom. Reason. 45(2): 89 (2010) - [c46]Alessio Merlo, Alessandro Armando
:
Cooperative access control for the Grid. IAS 2010: 228-233 - [c45]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Keqin Li, Giancarlo Pellegrino
:
Model-Checking Driven Security Testing of Web-Based Applications. ICST Workshops 2010: 361-370 - [c44]Alessandro Armando
, Silvio Ranise
:
Automated Symbolic Analysis of ARBAC-Policies. STM 2010: 17-34
2000 – 2009
- 2009
- [j21]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
LTL model checking for security protocols. J. Appl. Non Class. Logics 19(4): 403-429 (2009) - [j20]Alessandro Armando
, Jacopo Mantovani, Lorenzo Platania:
Bounded model checking of software using SMT solvers instead of SAT solvers. Int. J. Softw. Tools Technol. Transf. 11(1): 69-83 (2009) - [j19]Alessandro Armando
, Maria Paola Bonacina
, Silvio Ranise
, Stephan Schulz:
New results on rewrite-based satisfiability procedures. ACM Trans. Comput. Log. 10(1): 4:1-4:51 (2009) - [c43]Alessandro Armando
:
Building SMT-Based Software Model Checkers: An Experience Report. FroCoS 2009: 1-17 - [c42]Alessandro Armando
, Serena Elisa Ponta:
Model Checking of Security-Sensitive Business Processes. Formal Aspects in Security and Trust 2009: 66-80 - [c41]Alessandro Armando
, Enrico Giunchiglia
, Serena Elisa Ponta:
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach. TrustBus 2009: 63-72 - 2008
- [j18]Alessandro Armando
, Luca Compagna:
SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7(1): 3-32 (2008) - [c40]Alessandro Armando:
Model Checking: New Challenges and Opportunities for Automated Reasoning (Invited Talk). PAAR/ESHOL 2008 - [c39]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Llanos Tobarra
:
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. FMSE 2008: 1-10 - [e5]Alessandro Armando, Peter Baumgartner, Gilles Dowek:
Automated Reasoning, 4th International Joint Conference, IJCAR 2008, Sydney, Australia, August 12-15, 2008, Proceedings. Lecture Notes in Computer Science 5195, Springer 2008, ISBN 978-3-540-71069-1 [contents] - 2007
- [c38]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
LTL Model Checking for Security Protocols. CSF 2007: 385-396 - [c37]Alessandro Armando
, Massimo Benerecetti
, Dario Carotenuto, Jacopo Mantovani, Pasquale Spica:
The eureka tool for software model checking. ASE 2007: 541-542 - [c36]Alessandro Armando, Massimo Benerecetti, Jacopo Mantovani:
Abstraction Refinement of Linear Programs with Arrays. TACAS 2007: 373-388 - 2006
- [j17]Alessandro Armando
, Christophe Ringeissen:
Special issue on combining logical systems. Inf. Comput. 204(10): 1411-1412 (2006) - [j16]Alessandro Armando
, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò:
Automated Reasoning for Security Protocol Analysis. J. Autom. Reason. 36(1-2): 1-3 (2006) - [c35]Alessandro Armando
, Jacopo Mantovani, Lorenzo Platania:
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers. SPIN 2006: 146-162 - [e4]Alessandro Armando, Alessandro Cimatti:
Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005. Electronic Notes in Theoretical Computer Science 144(2), Elsevier 2006 [contents] - [i1]Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan Schulz:
New results on rewrite-based satisfiability procedures. CoRR abs/cs/0604054 (2006) - 2005
- [j15]Alessandro Armando
, Claudio Castellini
, Enrico Giunchiglia
, Marco Maratea:
The SAT-based Approach to Separation Logic. J. Autom. Reason. 35(1-3): 237-263 (2005) - [j14]Alessandro Armando
, Clemens Ballarin:
A reconstruction and extension of Maple's assume facility via constraint contextual rewriting. J. Symb. Comput. 39(5): 503-521 (2005) - [c34]Alessandro Armando, Luca Compagna, Silvio Ranise:
Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation. Mechanizing Mathematical Reasoning 2005: 30-45 - [c33]Alessandro Armando, Claudio Castellini
, Enrico Giunchiglia
, Fausto Giunchiglia, Armando Tacchella
:
SAT-Based Decision Procedures for Automated Reasoning: A Unifying Perspective. Mechanizing Mathematical Reasoning 2005: 46-58 - [c32]Alessandro Armando, David A. Basin
, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko
, Jacopo Mantovani, Sebastian Mödersheim
, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c31]Alessandro Armando
, Maria Paola Bonacina, Silvio Ranise
, Stephan Schulz:
On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal. FroCoS 2005: 65-80 - [c30]Alessandro Armando
, Alessandro Cimatti
:
Preface. PDPAR@CAV 2005: 1-2 - [c29]Alessandro Armando
, Massimo Benerecetti
, Jacopo Mantovani:
Model Checking Linear Programs with Arrays. SoftMC@CAV 2005: 79-94 - [e3]Alessandro Armando, Luca Viganò:
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004. Electronic Notes in Theoretical Computer Science 125(1), Elsevier 2005 [contents] - 2004
- [c28]Alessandro Armando, Claudio Castellini
, Jacopo Mantovani:
Software Model Checking Using Linear Constraints. ICFEM 2004: 209-223 - [c27]Alessandro Armando, Luca Compagna, Yuliya Lierler:
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. JELIA 2004: 617-627 - [c26]Alessandro Armando, Luca Compagna:
SATMC: A SAT-Based Model Checker for Security Protocols. JELIA 2004: 730-733 - [c25]Alessandro Armando, Claudio Castellini, Enrico Giunchiglia, Marco Maratea:
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints. SAT 2004 - [c24]Alessandro Armando, Claudio Castellini
, Enrico Giunchiglia
, Marco Maratea:
A SAT-Based Decision Procedure for the Boolean Combination of Difference Constraints. SAT (Selected Papers 2004: 16-29 - [c23]Alessandro Armando
, Luca Viganò:
Preface. ARSPA@IJCAR 2004: 1 - [c22]Alessandro Armando
, Claudio Castellini
, Enrico Giunchiglia
, Massimo Idini, Marco Maratea:
TSAT++: an Open Platform for Satisfiability Modulo Theories. D/PDPAR@IJCAR 2004: 25-36 - [c21]Alessandro Armando
, Luca Compagna:
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. ARSPA@IJCAR 2004: 91-108 - 2003
- [j13]Alessandro Armando
, Silvio Ranise
, Michaël Rusinowitch:
A rewriting approach to satisfiability procedures. Inf. Comput. 183(2): 140-164 (2003) - [j12]Alessandro Armando
, Silvio Ranise
:
Constraint contextual rewriting. J. Symb. Comput. 36(1-2): 193-216 (2003) - [c20]Alessandro Armando, Luca Compagna, Pierre Ganty:
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. FME 2003: 875-893 - [c19]Alessandro Armando, Luca Compagna:
Abstraction-Driven SAT-based Analysis of Security Protocols. SAT 2003: 257-271 - 2002
- [j11]Alessandro Armando
, Michaël Rusinowitch, Sorin Stratulat:
Incorporating Decision Procedures in Implicit Induction. J. Symb. Comput. 34(4): 241-258 (2002) - [c18]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim
, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - [c17]Alessandro Armando, Luca Compagna:
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. FORTE 2002: 210-225 - [e2]Alessandro Armando:
Frontiers of Combining Systems, 4th International Workshop, FroCoS 2002, Santa Margherita Ligure, Italy, April 8-10, 2002, Proceedings. Lecture Notes in Computer Science 2309, Springer 2002, ISBN 3-540-43381-3 [contents] - 2001
- [j10]Alessandro Armando
, Tudor Jebelean:
Special Issue on Calculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors. J. Symb. Comput. 32(4): 303-304 (2001) - [j9]Alessandro Armando
, Alessandro Coglio, Fausto Giunchiglia, Silvio Ranise
:
The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics. J. Symb. Comput. 32(4): 305-332 (2001) - [j8]Alessandro Armando, Silvio Ranise:
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic. J. Univers. Comput. Sci. 7(2): 124-140 (2001) - [c16]Alessandro Armando, Luca Compagna, Silvio Ranise:
System Description: RDL : Rewrite and Decision Procedure Laboratory. IJCAR 2001: 663-669 - [c15]Alessandro Armando, Felice Peccia, Silvio Ranise:
The Phase Transition of the Linear Inequalities Problem. CP 2001: 422-432 - [c14]Alessandro Armando, Silvio Ranise, Michaël Rusinowitch:
Uniform Derivation of Decision Procedures by Superposition. CSL 2001: 513-527 - [c13]Alessandro Armando, Clemens Ballarin:
Maple's evaluation process as constraint contextual rewriting. ISSAC 2001: 32-37 - 2000
- [c12]Alessandro Armando, Silvio Ranise:
Termination of Constraint Contextual Rewriting. FroCoS 2000: 47-61 - [c11]Alessandro Armando, Daniele Zini:
Towards Interoperable Mechanized Reasoning Systems: the Logic Broker Architecture. WOA 2000: 70-75
1990 – 1999
- 1999
- [j7]Alessandro Armando
, Alan Smaill, Ian Green:
Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm. Autom. Softw. Eng. 6(4): 329-356 (1999) - [c10]Alessandro Armando, Claudio Castellini
, Enrico Giunchiglia
:
SAT-Based Procedures for Temporal Reasoning. ECP 1999: 97-108 - [c9]Alessandro Armando
, Tudor Jebelean:
Preface. Calculemus 1999: 319-320 - [c8]Alessandro Armando
, Alessandro Coglio, Fausto Giunchiglia:
The control component of open mechanized reasoning systems. Calculemus 1999: 322-339 - [e1]Alessandro Armando, Tudor Jebelean:
Systems for Integrated Computation and Deduction, CALCULEMUS 1999, associated to FLoC '99, the 1999 Federated Logic Conference, Trento, Italy, July 11-12, 1999. Electronic Notes in Theoretical Computer Science 23(3), Elsevier 1999 [contents] - 1998
- [j6]Alessandro Armando, Jason Gallagher, Alan Smaill, Alan Bundy:
Automating the Synthesis of Decision Procedures in a Constructive Metatheory. Ann. Math. Artif. Intell. 22(3-4): 259-279 (1998) - [c7]Alessandro Armando, Erica Melis, Silvio Ranise:
Constraint Solving in Logic Programming and in Automated Deduction: A Comparison. AIMSA 1998: 28-38 - [c6]Alessandro Armando, Silvio Ranise:
From Integrated Reasoning Specialists to "Plug-and-Play" Reasoning Components. AISC 1998: 42-54 - 1997
- [c5]Alessandro Armando, Alan Smaill, Ian Green:
Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm. ASE 1997: 2-9 - 1996
- [j5]Fausto Giunchiglia, Paolo Pecchiari, Alessandro Armando
:
Towards provably correct system synthesis and extension. Future Gener. Comput. Syst. 12(2-3): 123-137 (1996) - [j4]Enrico Giunchiglia
, Alessandro Armando
, Paolo Traverso
, Alessandro Cimatti
:
Visual representation of natural language scene descriptions. IEEE Trans. Syst. Man Cybern. Part B 26(4): 575-589 (1996) - 1995
- [j3]Enrico Giunchiglia
, Alessandro Armando
, Paolo Pecchiari:
Structured Proof Procedures. Ann. Math. Artif. Intell. 15(1): 1-18 (1995) - 1994
- [j2]Paolo Traverso
, Alessandro Cimatti
, Luca Spalazzi
, Alessandro Armando
, Enrico Giunchiglia
:
MRG: Building planers for real-world complex applications. Appl. Artif. Intell. 8(3): 333-357 (1994) - 1993
- [j1]Alessandro Armando
, Enrico Giunchiglia
:
Embedding Complex Decision Procedures Inside an Interactive Theorem Prover. Ann. Math. Artif. Intell. 8(3-4): 475-502 (1993) - [c4]Mauro Di Manzo, Enrico Giunchiglia
, Alessandro Armando, Paolo Pecchiari:
Proving Formulas through Reduction to Decidable Classes. AI*IA 1993: 1-10 - [c3]Alessandro Armando, Alessandro Cimatti
, Luca Viganò:
Building and Executing Proof Strategies in a Formal Metatheory. AI*IA 1993: 11-22 - [c2]Alessandro Armando, Paolo Pecchiari:
NALIG: A CAD System for Interior Design with High Level Interaction Capabilities. ICTAI 1993: 446-447 - 1992
- [c1]Paolo Traverso, Alessandro Armando, Enrico Giunchiglia:
A Knowledge Based System for Automatic 3D Scene. AIMSA 1992: 255-264
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint